General

  • Target

    SecuriteInfo.com.Exploit.Siggen3.17232.13262.6275

  • Size

    33KB

  • Sample

    220816-jlyxfshac6

  • MD5

    7a115715d7ff051cdc0a008521e2c35e

  • SHA1

    34e5ceddef13f16f6f5ee775c198b5cf76552b55

  • SHA256

    d5d8cca33368d72e3d58ea71e3b4984f336d93b21af1c896141635961a0d777d

  • SHA512

    821f80a21bef4999bfd9f1aa846d1b5649dbb96d4e0acf3004966eb7ba9f418412db0450dcc11c72cca4c8ce1d9c2b9ac0b33ce8083f3e814bc9c74d15ec670e

Score
10/10

Malware Config

Targets

    • Target

      SecuriteInfo.com.Exploit.Siggen3.17232.13262.6275

    • Size

      33KB

    • MD5

      7a115715d7ff051cdc0a008521e2c35e

    • SHA1

      34e5ceddef13f16f6f5ee775c198b5cf76552b55

    • SHA256

      d5d8cca33368d72e3d58ea71e3b4984f336d93b21af1c896141635961a0d777d

    • SHA512

      821f80a21bef4999bfd9f1aa846d1b5649dbb96d4e0acf3004966eb7ba9f418412db0450dcc11c72cca4c8ce1d9c2b9ac0b33ce8083f3e814bc9c74d15ec670e

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks